default search action
Iulian Neamtiu
Person information
- affiliation: New Jersey Institute of Technology, USA
- affiliation (former): University of California, Riverside, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Sydur Rahaman, Raina Samuel, Iulian Neamtiu:
Diagnosing Medical Score Calculator Apps. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(3): 118:1-118:27 (2023) - [c79]Muyeed Ahmed, Iulian Neamtiu:
DeAnomalyzer: Improving Determinism and Consistency in Anomaly Detection Implementations. AITest 2023: 17-25 - [c78]Sydur Rahaman, Umar Farooq, Iulian Neamtiu, Zhijia Zhao:
Detecting Potential User-data Save & Export Losses due to Android App Termination. AST 2023: 152-162 - 2022
- [c77]Muyeed Ahmed, Iulian Neamtiu:
Anomalous Anomaly Detection. AITest 2022: 1-6 - [c76]Preethi Santhanam, Hoang Dang, Zhiyong Shan, Iulian Neamtiu:
Scraping Sticky Leftovers: App User Information Left on Servers After Account Deletion. SP 2022: 2145-2160 - [c75]Yousra Lembachar, Ryan Rusich, Iulian Neamtiu, Gianfranco Ciardo:
Bddl: A Type System for Binary Decision Diagrams. TAP@STAF 2022: 31-47 - 2021
- [c74]Sydur Rahaman, Raina Samuel, Iulian Neamtiu:
Quantifying Nondeterminism and Inconsistency in Self-organizing Map Implementations. AITest 2021: 85-92 - [c73]Sydur Rahaman, Iulian Neamtiu, Xin Yin:
Algebraic-datatype taint tracking, with applications to understanding Android identifier leaks. ESEC/SIGSOFT FSE 2021: 70-82 - 2020
- [j14]Umar Farooq, Zhijia Zhao, Manu Sridharan, Iulian Neamtiu:
LiveDroid: identifying and preserving mobile app state in volatile runtime environments. Proc. ACM Program. Lang. 4(OOPSLA): 160:1-160:30 (2020) - [c72]Xin Yin, Iulian Neamtiu, Saketan Patil, Sean T. Andrews:
Implementation-induced Inconsistency and Nondeterminism in Deterministic Clustering Algorithms. ICST 2020: 231-242 - [c71]Raina Samuel, Philipp Markert, Adam J. Aviv, Iulian Neamtiu:
Knock, Knock. Who's There? On the Security of LG's Knock Codes. SOUPS @ USENIX Security Symposium 2020: 37-59 - [i2]Raina Samuel, Philipp Markert, Adam J. Aviv, Iulian Neamtiu:
Knock, Knock. Who's There? On the Security of LG's Knock Codes. CoRR abs/2006.03556 (2020)
2010 – 2019
- 2019
- [c70]Xin Yin, Vincenzo Musco, Iulian Neamtiu, Usman Roshan:
Statistically Rigorous Testing of Clustering Implementations. AITest 2019: 91-98 - [c69]Tanzirul Azim, Arash Alavi, Iulian Neamtiu, Rajiv Gupta:
Dynamic slicing for Android. ICSE 2019: 1154-1164 - [c68]Vincenzo Musco, Xin Yin, Iulian Neamtiu:
SmokeOut: An Approach for Testing Clustering Implementations. ICST 2019: 473-480 - [c67]Zhiyong Shan, Raina Samuel, Iulian Neamtiu:
Device Administrator Use and Abuse in Android: Detection and Characterization. MobiCom 2019: 51:1-51:16 - [c66]Yongjian Hu, Oriana Riva, Suman Nath, Iulian Neamtiu:
Elix: Path-Selective Taint Analysis for Extracting Mobile App Links. MobiSys 2019: 193-206 - 2018
- [c65]Yongjian Hu, Iulian Neamtiu:
Static Detection of Event-based Races in Android Apps. ASPLOS 2018: 257-270 - [c64]Priyam Patel, Gokul Srinivasan, Sydur Rahaman, Iulian Neamtiu:
On the effectiveness of random testing for Android: or how i learned to stop worrying and love the monkey. AST@ICSE 2018: 34-37 - [c63]Zhiyong Shan, Iulian Neamtiu, Raina Samuel:
Self-hiding behavior in Android apps: detection and characterization. ICSE 2018: 728-739 - 2017
- [j13]Xuetao Wei, Nicholas Valler, Harsha V. Madhyastha, Iulian Neamtiu, Michalis Faloutsos:
Characterizing the behavior of handheld devices and its implications. Comput. Networks 114: 1-12 (2017) - [j12]Iulian Neamtiu, Xuetao Wei, Michalis Faloutsos, Lorenzo Gomez, Tanzirul Azim, Yongjian Hu, Zhiyong Shan:
Improving Smartphone Security and Reliability. J. Interconnect. Networks 17(1): 1740002:1-1740002:67 (2017) - [j11]Indrajeet Singh, Srikanth V. Krishnamurthy, Harsha V. Madhyastha, Iulian Neamtiu:
ZapDroid: Managing Infrequently Used Applications on Smartphones. IEEE Trans. Mob. Comput. 16(5): 1475-1489 (2017) - [c62]Yunfeng Hong, Yongjian Hu, Chun-Ming Lai, Shyhtsun Felix Wu, Iulian Neamtiu, Patrick D. McDaniel, Paul L. Yu, Hasan Cam, Gail-Joon Ahn:
Defining and Detecting Environment Discrimination in Android Apps. SecureComm 2017: 510-529 - 2016
- [c61]Amlan Kusum, Iulian Neamtiu, Rajiv Gupta:
Safe and flexible adaptation via alternate data structure representations. CC 2016: 34-44 - [c60]Vineet Singh, Rajiv Gupta, Iulian Neamtiu:
Automatic fault location for data structures. CC 2016: 99-109 - [c59]Amlan Kusum, Keval Vora, Rajiv Gupta, Iulian Neamtiu:
Efficient Processing of Large Graphs via Input Reduction. HPDC 2016: 245-257 - [c58]Yongjian Hu, Iulian Neamtiu:
Fuzzy and cross-app replay for smartphone apps. AST@ICSE 2016: 50-56 - [c57]Yongjian Hu, Iulian Neamtiu:
VALERA: an effective and efficient record-and-replay tool for android. MOBILESoft 2016: 285-286 - [c56]Vineet Singh, Iulian Neamtiu, Rajiv Gupta:
Proving Concurrent Data Structures Linearizable. ISSRE 2016: 230-240 - [c55]Yongjian Hu, Iulian Neamtiu, Arash Alavi:
Automatically verifying and reproducing event-based races in Android apps. ISSTA 2016: 377-388 - [c54]Zhiyong Shan, Tanzirul Azim, Iulian Neamtiu:
Finding resume and restart errors in Android applications. OOPSLA 2016: 864-880 - 2015
- [c53]Bo Zhou, Iulian Neamtiu, Rajiv Gupta:
Predicting concurrency bugs: how many, what kind and where are they? EASE 2015: 6:1-6:10 - [c52]Bo Zhou, Iulian Neamtiu, Rajiv Gupta:
A cross-platform analysis of bugs and bug-fixing in open source projects: desktop vs. Android vs. iOS. EASE 2015: 7:1-7:10 - [c51]Xuetao Wei, Iulian Neamtiu, Michalis Faloutsos:
Whom Does Your Android App Talk To? GLOBECOM 2015: 1-6 - [c50]Indrajeet Singh, Srikanth V. Krishnamurthy, Harsha V. Madhyastha, Iulian Neamtiu:
ZapDroid: managing infrequently used applications on smartphones. UbiComp 2015: 1185-1196 - [c49]Xuetao Wei, Nicholas Valler, Harsha V. Madhyastha, Iulian Neamtiu, Michalis Faloutsos:
A behavior-aware profiling of handheld devices. INFOCOM 2015: 846-854 - [c48]Bo Zhou, Iulian Neamtiu, Rajiv Gupta:
Experience report: How do bug characteristics differ across severity classes: A multi-platform study. ISSRE 2015: 507-517 - [c47]Sai Charan Koduru, Rajiv Gupta, Iulian Neamtiu:
Size Oblivious Programming with InfiniMem. LCPC 2015: 3-19 - [c46]Zhiyong Shan, Iulian Neamtiu, Zhiyun Qian, Don J. Torrieri:
Proactive restart as cyber maneuver for Android. MILCOM 2015: 19-24 - [c45]Lisa M. Marvel, Scott E. Brown, Iulian Neamtiu, Richard E. Harang, David Harman, Brian Henz:
A framework to evaluate cyber agility. MILCOM 2015: 31-36 - [c44]Yongjian Hu, Tanzirul Azim, Iulian Neamtiu:
Improving the Android development lifecycle with the VALERA record-and-replay approach. MobileDeLi 2015: 7-8 - [c43]Yongjian Hu, Tanzirul Azim, Iulian Neamtiu:
Versatile yet lightweight record-and-replay for Android. OOPSLA 2015: 349-366 - [c42]Vineet Singh, Rajiv Gupta, Iulian Neamtiu:
MG++: Memory graphs for analyzing dynamic data structures. SANER 2015: 291-300 - 2014
- [c41]Patrick D. McDaniel, Trent Jaeger, Thomas F. La Porta, Nicolas Papernot, Robert J. Walls, Alexander Kott, Lisa M. Marvel, Ananthram Swami, Prasant Mohapatra, Srikanth V. Krishnamurthy, Iulian Neamtiu:
Security and Science of Agility. MTD@CCS 2014: 13-19 - [c40]Yan Wang, Harish Patil, Cristiano Pereira, Gregory Lueck, Rajiv Gupta, Iulian Neamtiu:
DrDebug: Deterministic Replay based Cyclic Debugging with Dynamic Slicing. CGO 2014: 98 - [c39]Pamela Bhattacharya, Iulian Neamtiu, Michalis Faloutsos:
Determining Developers' Expertise and Role: A Graph Hierarchy-Based Approach. ICSME 2014: 11-20 - [c38]Tanzirul Azim, Iulian Neamtiu, Lisa M. Marvel:
Towards self-healing smartphone software via automated patching. ASE 2014: 623-628 - [i1]Amlan Kusum, Iulian Neamtiu, Rajiv Gupta:
Adapting Graph Application Performance via Alternate Data Structure Representation. CoRR abs/1412.8120 (2014) - 2013
- [j10]Xuetao Wei, Nicholas Valler, B. Aditya Prakash, Iulian Neamtiu, Michalis Faloutsos, Christos Faloutsos:
Competing Memes Propagation on Networks: A Network Science Perspective. IEEE J. Sel. Areas Commun. 31(6): 1049-1060 (2013) - [j9]Karla Saur, Iulian Neamtiu:
Report on the fourth workshop on hot topics in software upgrades (HotSWUp 2012). ACM SIGOPS Oper. Syst. Rev. 47(1): 55-62 (2013) - [j8]Iulian Neamtiu, Guowu Xie, Jianbo Chen:
Towards a better understanding of software evolution: an empirical study on open-source software. J. Softw. Evol. Process. 25(3): 193-218 (2013) - [c37]Iulian Neamtiu, Jonathan Bardin, Md. Reaz Uddin, Dien-Yen Lin, Pamela Bhattacharya:
Improving Cloud Availability with On-the-fly Schema Updates. COMAD 2013: 24-34 - [c36]Pamela Bhattacharya, Liudmila Ulanova, Iulian Neamtiu, Sai Charan Koduru:
An Empirical Analysis of Bug Reports and Bug Fixing in Open Source Android Apps. CSMR 2013: 133-143 - [c35]Lorenzo Gomez, Iulian Neamtiu, Tanzirul Azim, Todd D. Millstein:
RERAN: timing- and touch-sensitive record and replay for Android. ICSE 2013: 72-81 - [c34]Min Feng, Rajiv Gupta, Iulian Neamtiu:
Programming Support for Speculative Execution with Software Transactional Memory. IPDPS Workshops 2013: 394-403 - [c33]Yan Wang, Rajiv Gupta, Iulian Neamtiu:
Relevant inputs analysis and its applications. ISSRE 2013: 268-277 - [c32]Yan Wang, Iulian Neamtiu, Rajiv Gupta:
Generating sound and effective memory debuggers. ISMM 2013: 51-62 - [c31]Xuetao Wei, Nicholas Valler, Michalis Faloutsos, Iulian Neamtiu, B. Aditya Prakash, Christos Faloutsos:
Smartphone viruses propagation on heterogeneous composite networks. NSW 2013: 106-109 - [c30]Tanzirul Azim, Iulian Neamtiu:
Targeted and depth-first exploration for systematic testing of android apps. OOPSLA 2013: 641-660 - [c29]Yan Wang, Min Feng, Rajiv Gupta, Iulian Neamtiu:
A state alteration and inspection-based interactive debugger. SCAM 2013: 84-93 - 2012
- [j7]Xuetao Wei, Nicholas Valler, B. Aditya Prakash, Iulian Neamtiu, Michalis Faloutsos, Christos Faloutsos:
Competing memes propagation on networks: a case study of composite networks. Comput. Commun. Rev. 42(5): 5-12 (2012) - [j6]Pamela Bhattacharya, Iulian Neamtiu, Christian R. Shelton:
Automated, highly-accurate, bug assignment using machine learning and tossing graphs. J. Syst. Softw. 85(10): 2275-2292 (2012) - [j5]Christopher M. Hayden, Iulian Neamtiu:
Report on the third workshop on hot topics in software upgrades (HotSWUp'11). ACM SIGOPS Oper. Syst. Rev. 46(1): 93-99 (2012) - [c28]Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos:
Permission evolution in the Android ecosystem. ACSAC 2012: 31-40 - [c27]Rida A. Bazzi, Bryan Topp, Iulian Neamtiu:
How to have your cake and eat it too: Dynamic software updating with just-in-time overhead. HotSWUp 2012: 1-5 - [c26]Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos:
Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It? ICDE Workshops 2012: 251-254 - [c25]Pamela Bhattacharya, Marios Iliofotou, Iulian Neamtiu, Michalis Faloutsos:
Graph-based analysis and prediction for software evolution. ICSE 2012: 419-429 - [c24]Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos:
ProfileDroid: multi-layer profiling of android applications. MobiCom 2012: 137-148 - [c23]Min Feng, Rajiv Gupta, Iulian Neamtiu:
Effective parallelization of loops in the presence of I/O operations. PLDI 2012: 487-498 - 2011
- [c22]Shengfeng Wu, Iulian Neamtiu:
Schema evolution analysis for embedded databases. ICDE Workshops 2011: 151-156 - [c21]Cuixiong Hu, Iulian Neamtiu:
Automating GUI testing for Android applications. AST 2011: 77-83 - [c20]Pamela Bhattacharya, Iulian Neamtiu:
Assessing programming language impact on development and maintenance: a study on c and c++. ICSE 2011: 171-180 - [c19]Iulian Neamtiu:
Elastic executions from inelastic programs. SEAMS 2011: 178-183 - [c18]Iulian Neamtiu, Tudor Dumitras:
Cloud software upgrades: Challenges and opportunities. MESOCA 2011: 1-10 - [c17]Pamela Bhattacharya, Iulian Neamtiu:
Bug-fix time prediction models: can we do better? MSR 2011: 207-210 - [c16]Cuixiong Hu, Iulian Neamtiu:
A GUI bug finding framework for Android applications. SAC 2011: 1490-1491 - [c15]Tudor Dumitras, Iulian Neamtiu:
Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware. CSET 2011 - 2010
- [j4]Tudor Dumitras, Iulian Neamtiu, Eli Tilevich:
Report on the second ACM workshop on hot topics in software upgrades (HotSWUp'09): http://www.hotswup.org/2009/. ACM SIGOPS Oper. Syst. Rev. 44(4): 146-152 (2010) - [c14]Steve D. Suh, Iulian Neamtiu:
Studying Software Evolution for Taming Software Complexity. Australian Software Engineering Conference 2010: 3-12 - [c13]Pamela Bhattacharya, Iulian Neamtiu:
Fine-grained incremental learning and multi-feature tossing graphs to improve bug triaging. ICSM 2010: 1-10
2000 – 2009
- 2009
- [c12]Guowu Xie, Jianbo Chen, Iulian Neamtiu:
Towards a better understanding of software evolution: An empirical study on open source software. ICSM 2009: 51-60 - [c11]Dien-Yen Lin, Iulian Neamtiu:
Collateral evolution of applications and databases. EVOL/IWPSE 2009: 31-40 - [c10]Tudor Dumitras, Iulian Neamtiu, Eli Tilevich:
Second ACM workshop on hot topics in software upgrades (HotSWUp 2009). OOPSLA Companion 2009: 705-706 - [c9]Iulian Neamtiu, Michael W. Hicks:
Safe and timely updates to multi-threaded programs. PLDI 2009: 13-24 - [e2]Tudor Dumitras, Iulian Neamtiu, Eli Tilevich:
Proceedings of the 2nd ACM Workshop on Hot Topics in Software Upgrades, HotSWUp 2009, Orlando, FL, USA, October 25, 2009. ACM 2009, ISBN 978-1-60558-723-3 [contents] - 2008
- [b1]Iulian Neamtiu:
Practical Dynamic Software Updating. University of Maryland, College Park, MD, USA, 2008 - [c8]Tudor Dumitras, Danny Dig, Iulian Neamtiu:
1st ACM workshop on hot topics in software upgrades (HotSWUp 2008). OOPSLA Companion 2008: 837-838 - [c7]Madanlal Musuvathi, Shaz Qadeer, Thomas Ball, Gérard Basler, Piramanayagam Arumuga Nainar, Iulian Neamtiu:
Finding and Reproducing Heisenbugs in Concurrent Programs. OSDI 2008: 267-280 - [c6]Iulian Neamtiu, Michael Hicks, Jeffrey S. Foster, Polyvios Pratikakis:
Contextual effects for version-consistent dynamic software updatingalland safe concurrent programming. POPL 2008: 37-49 - [c5]Polyvios Pratikakis, Jeffrey S. Foster, Michael Hicks, Iulian Neamtiu:
Formalizing Soundness of Contextual Effects. TPHOLs 2008: 262-277 - [e1]Tudor Dumitras, Danny Dig, Iulian Neamtiu:
Proceedings of the 1st ACM Workshop on Hot Topics in Software Upgrades, HotSWUp 2008, Nashville, TN, USA, October 20, 2008. ACM 2008, ISBN 978-1-60558-304-4 [contents] - 2007
- [j3]Gareth Paul Stoyle, Michael W. Hicks, Gavin M. Bierman, Peter Sewell, Iulian Neamtiu:
Mutatis Mutandis: Safe and predictable dynamic software updating. ACM Trans. Program. Lang. Syst. 29(4): 22 (2007) - 2006
- [c4]Iulian Neamtiu, Michael W. Hicks, Gareth Paul Stoyle, Manuel Oriol:
Practical dynamic software updating for C. PLDI 2006: 72-83 - 2005
- [j2]Florin Sultan, Aniruddha Bohra, Stephen Smaldone, Yufei Pan, Pascal Gallard, Iulian Neamtiu, Liviu Iftode:
Recovering Internet Service Sessions from Operating System Failures. IEEE Internet Comput. 9(2): 17-27 (2005) - [j1]Iulian Neamtiu, Jeffrey S. Foster, Michael Hicks:
Understanding source code evolution using abstract syntax tree matching. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-5 (2005) - [c3]Iulian Neamtiu, Jeffrey S. Foster, Michael W. Hicks:
Understanding source code evolution using abstract syntax tree matching. MSR 2005 - [c2]Gareth Paul Stoyle, Michael W. Hicks, Gavin M. Bierman, Peter Sewell, Iulian Neamtiu:
Mutatis mutandis: safe and predictable dynamic software updating. POPL 2005: 183-194 - 2004
- [c1]Aniruddha Bohra, Iulian Neamtiu, Pascal Gallard, Florin Sultan, Liviu Iftode:
Remote Repair of Operating System State Using Backdoors. ICAC 2004: 256-263
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-10 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint